Kojima et al., 2021 - Google Patents
A new schnorr multi-signatures to support both multiple messages signing and key aggregationKojima et al., 2021
View PDF- Document ID
- 13446733210910236083
- Author
- Kojima R
- Yamamoto D
- Shimoyama T
- Yasaki K
- Nimura K
- Publication year
- Publication venue
- Journal of Information Processing
External Links
Snippet
A digital signature is essential for verifying people's reliability and data integrity over networks and is used in web server certificates, authentication, and blockchain technologies. Specifically, to solve the bitcoin scalability problem, Multi-Signature (MS) schemes have …
- 230000002776 aggregation 0 title abstract description 40
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chi et al. | A privacy-preserving zero-knowledge proof for blockchain | |
Singh et al. | Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection | |
Chow et al. | Server-aided signatures verification secure against collusion attack | |
Hafizul Islam et al. | Dynamic id-based remote user mutual authentication scheme with smartcard using elliptic curve cryptography | |
WO2014068427A1 (en) | Reissue of cryptographic credentials | |
CN118473637A (en) | Cross-chain identity authentication method and system based on group signature and zero knowledge proof | |
Zhu et al. | An efficient decentralized identity management system based on range proof for social networks | |
Agrawal et al. | Game-set-MATCH: Using mobile devices for seamless external-facing biometric matching | |
Deng et al. | FutureDID: A fully decentralized identity system with Multi-Party verification | |
Yang et al. | A minimal disclosure signature authentication scheme based on consortium blockchain | |
CN116383894A (en) | Modifiable alliance chain performance optimization method based on verifiable VDCH function | |
Kojima et al. | A new schnorr multi-signatures to support both multiple messages signing and key aggregation | |
Li et al. | Lattice-Based Conditional Privacy-Preserving Batch Authentication Protocol for Fog-Assisted Vehicular Ad Hoc Networks | |
Zhang et al. | Efficient privacy protection authentication protocol for vehicle network in 5G | |
Fischlin et al. | BUFFing Threshold Signature Schemes | |
Nakazawa et al. | A strongly unlinkable group signature scheme with matching-based verifier-local revocation for privacy-enhancing crowdsensing | |
Hölzl et al. | Bridging the gap in privacy-preserving revocation: practical and scalable revocation of mobile eIDs | |
CN116032480B (en) | A certificateless broadcast multi-signature method based on pair-less mapping | |
Bhargav-Spantzel et al. | Multifactor identity verification using aggregated proof of knowledge | |
Kojima et al. | A novel scheme of Schnorr multi-signatures for multiple messages with key aggregation | |
Payeras-Capellà et al. | Design and performance evaluation of two approaches to obtain anonymity in transferable electronic ticketing schemes | |
Lin et al. | F2P‐ABS: A Fast and Secure Attribute‐Based Signature for Mobile Platforms | |
Zhang et al. | Anonymous credential protocol based on SM2 digital signature | |
Nakanishi et al. | Short DL-based blacklistable ring signatures from DualRing | |
Faonio et al. | Subversion-resilient enhanced privacy ID |